CVE-2012-3500

scripts/annotate-output.sh in devscripts before 2.12.2, as used in rpmdevtools before 8.3, allows local users to modify arbitrary files via a symlink attack on the temporary (1) standard output or (2) standard error output file.
References
Link Resource
http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commit%3Bh=4d23a5e6c90f7a37b0972b30f5d31dce97a93eb0
http://git.fedorahosted.org/cgit/rpmdevtools.git/commit/?id=90b4400c2ab2e80cecfd8dfdf031536376ed2cdb Patch
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086138.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086159.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087335.html
http://lists.opensuse.org/opensuse-updates/2012-11/msg00000.html
http://secunia.com/advisories/50600 Vendor Advisory
http://www.debian.org/security/2012/dsa-2549 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:123
http://www.openwall.com/lists/oss-security/2012/08/31/7
http://www.securityfocus.com/bid/55358
http://www.ubuntu.com/usn/USN-1593-1
https://bugzilla.redhat.com/show_bug.cgi?id=848022
https://exchange.xforce.ibmcloud.com/vulnerabilities/78230
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0316
http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commit%3Bh=4d23a5e6c90f7a37b0972b30f5d31dce97a93eb0
http://git.fedorahosted.org/cgit/rpmdevtools.git/commit/?id=90b4400c2ab2e80cecfd8dfdf031536376ed2cdb Patch
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086138.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086159.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087335.html
http://lists.opensuse.org/opensuse-updates/2012-11/msg00000.html
http://secunia.com/advisories/50600 Vendor Advisory
http://www.debian.org/security/2012/dsa-2549 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:123
http://www.openwall.com/lists/oss-security/2012/08/31/7
http://www.securityfocus.com/bid/55358
http://www.ubuntu.com/usn/USN-1593-1
https://bugzilla.redhat.com/show_bug.cgi?id=848022
https://exchange.xforce.ibmcloud.com/vulnerabilities/78230
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0316
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:fedora:rpmdevtools:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:41

Type Values Removed Values Added
References () http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commit%3Bh=4d23a5e6c90f7a37b0972b30f5d31dce97a93eb0 - () http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commit%3Bh=4d23a5e6c90f7a37b0972b30f5d31dce97a93eb0 -
References () http://git.fedorahosted.org/cgit/rpmdevtools.git/commit/?id=90b4400c2ab2e80cecfd8dfdf031536376ed2cdb - Patch () http://git.fedorahosted.org/cgit/rpmdevtools.git/commit/?id=90b4400c2ab2e80cecfd8dfdf031536376ed2cdb - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086138.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086138.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086159.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086159.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087335.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087335.html -
References () http://lists.opensuse.org/opensuse-updates/2012-11/msg00000.html - () http://lists.opensuse.org/opensuse-updates/2012-11/msg00000.html -
References () http://secunia.com/advisories/50600 - Vendor Advisory () http://secunia.com/advisories/50600 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2549 - Vendor Advisory () http://www.debian.org/security/2012/dsa-2549 - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:123 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:123 -
References () http://www.openwall.com/lists/oss-security/2012/08/31/7 - () http://www.openwall.com/lists/oss-security/2012/08/31/7 -
References () http://www.securityfocus.com/bid/55358 - () http://www.securityfocus.com/bid/55358 -
References () http://www.ubuntu.com/usn/USN-1593-1 - () http://www.ubuntu.com/usn/USN-1593-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=848022 - () https://bugzilla.redhat.com/show_bug.cgi?id=848022 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/78230 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/78230 -
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0316 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0316 -

Information

Published : 2012-10-01 00:55

Updated : 2024-11-21 01:41


NVD link : CVE-2012-3500

Mitre link : CVE-2012-3500

CVE.ORG link : CVE-2012-3500


JSON object : View

Products Affected

devscripts_devel_team

  • devscripts

fedora

  • rpmdevtools
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')